Comments
A-Key requires the most security
Posted by HamidAliKhan
A-Key requires the most security
Its requirements are
1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)
Posted by jahangir1983
A-Key requires the most security
Its requirements are
1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)
Posted by jahangir1983
A-Key requires the most security
Its requirements are
1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)
Posted by jahangir1983
secure generation, secure entry into mobile, Secure entry into AC database are the requirements.
Posted by waqqas1
A-Key requires the most security
Its requirements are
1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)
Posted by sagitraz